[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Designing and implementing a cyberwar laboratory exercise for a computer security course

Published: 01 March 2004 Publication History

Abstract

The development of a cyberwar laboratory exercise for a computer security course raises many pedagogical and management issues relating to the structure of the laboratory, its network and the exercise itself. We have designed, implemented and given such an exercise, and faced many of these issues. Evaluation of this exercise leads to multiple insights about the proper goals, structure and implementation of such an exercise.

References

[1]
Hill, John, Carver, Curtis, Humphries, Jeffrey and Pooch, Udo, Using an Isolated Laboratory to Teach Advanced Networks and Security; SIGCSE Bulletin: Proc. 32nd Technical Symposium on Computer Science Education, v.33, n.1, March 2001, pp. 36--40.
[2]
Jackson, William, Cadets Keep NSA Crackers At Bay; Government Computer News, May 20, 2002.
[3]
Mateti, Prabhaker, A Laboratory-Based Course on Internet Security; SIGCSE Bulletin: Proc. 34th Technical Symposium on Computer Science Education, v.35, n.1, March 2003, pp. 252--256.
[4]
Micco, Mary and Rossman, Hart, Building a Cyberwar Lab: Lessons Learned; SIGCSE Bulletin: Proc. 33rd Technical Symposium on Computer Science Education, v.34, n.1, March 2002, pp. 23--27.
[5]
Norton Ghost, http://www.symantec.com/ghost
[6]
Redhat Linux, http://www.redhat.com/
[7]
Redhat Network up2date Network Automatic Upgrade System, http://rhn.redhat.com/
[8]
Schneier, Bruce, Security is not a Product; It's a Process; Cryptogram Online Security Newsletter, http://www.schneier.com/crypto-gram-9912.html#SecurityIsNotaProductItsaProcess, December 1999.
[9]
VMWare, http://www.vmware.com

Cited By

View all
  • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
  • (2021)Design of Network Forensics Labs for Teaching-oriented Institutions2021 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI54926.2021.00213(959-963)Online publication date: Dec-2021
  • (2016)A Network Steganography Lab on Detecting TCP/IP Covert ChannelsIEEE Transactions on Education10.1109/TE.2016.252040059:3(224-232)Online publication date: Aug-2016
  • Show More Cited By

Index Terms

  1. Designing and implementing a cyberwar laboratory exercise for a computer security course

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCSE Bulletin
    ACM SIGCSE Bulletin  Volume 36, Issue 1
    March 2004
    501 pages
    ISSN:0097-8418
    DOI:10.1145/1028174
    Issue’s Table of Contents
    • cover image ACM Conferences
      SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on Computer science education
      March 2004
      544 pages
      ISBN:1581137982
      DOI:10.1145/971300
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 March 2004
    Published in SIGCSE Volume 36, Issue 1

    Check for updates

    Author Tags

    1. cybersecurity
    2. cyberwar
    3. exercise
    4. laboratory
    5. security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 19 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Eureka Labs: Enhancing Cybersecurity Education through Inquiry-based Hands-on Activities2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI)10.1109/SWC50871.2021.00082(552-557)Online publication date: Oct-2021
    • (2021)Design of Network Forensics Labs for Teaching-oriented Institutions2021 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI54926.2021.00213(959-963)Online publication date: Dec-2021
    • (2016)A Network Steganography Lab on Detecting TCP/IP Covert ChannelsIEEE Transactions on Education10.1109/TE.2016.252040059:3(224-232)Online publication date: Aug-2016
    • (2013)Evaluation of students' learning behaviour and success in a practical computer networking course2013 Second International Conference on E-Learning and E-Technologies in Education (ICEEE)10.1109/ICeLeTE.2013.6644374(201-206)Online publication date: Sep-2013
    • (2013)A framework for teaching network security in academic environmentsInformation Management & Computer Security10.1108/IMCS-11-2011-005621:4(315-338)Online publication date: 7-Oct-2013
    • (2012)Virtualized lab infrastructure on a budget for various computing and engineering courses2012 International Conference on Information Technology Based Higher Education and Training (ITHET)10.1109/ITHET.2012.6246028(1-7)Online publication date: Jun-2012
    • (2011)Measuring the performance of network virtualization tool N2N in the design of a cyber warfare training and education platformProceedings of the 2011 Military Modeling & Simulation Symposium10.5555/2048558.2048563(28-35)Online publication date: 3-Apr-2011
    • (2010)The blunderdomeProceedings of the 3rd international conference on Cyber security experimentation and test10.5555/1924551.1924556(1-7)Online publication date: 9-Aug-2010
    • (2006)Virtual machines - an idea whose time has returnedACM SIGCSE Bulletin10.1145/1124706.112137538:1(102-106)Online publication date: 3-Mar-2006
    • (2006)A laboratory based capstone course in computer security for undergraduatesACM SIGCSE Bulletin10.1145/1124706.112134638:1(2-6)Online publication date: 3-Mar-2006
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media